(US-CERT) This report provides analysis of two malicious 32-bit Windows executable file. The malware implements a custom protocol that allows traffic to be tunneled between a source and a destination Internet Protocol (IP) address. The malware continuously attempts to reach out to the source and the designation system, which allows either side to initiate a tunneling session. The malware can be configured with a proxy server/port and proxy username and password. This feature allows connectivity to a system sitting inside of a proxy server, which allows the actor to bypass the compromised system’s required authentication to reach outside of the network.
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |
IP:Port | Timestamp |
---|
Domain | Timestamp |
---|
URL | Timestamp |
---|
2020-05-04 by ADEO DFIR from ADEO DFIR
2020-02-19 by Lexfo from Lexfo
2020-02-13 by Qi Anxin Threat Intelligence Center from Qianxin
2019-05-09 by CISA from CISA
2017-04-03 by GReAT from Kaspersky Labs
2017-04-03 by GReAT from Kaspersky Labs
Tool: ELECTRICFISH
Names: ELECTRICFISH, Alreay
Description: (US-CERT) This report provides analysis of two malicious 32-bit Windows executable file. The malware implements a custom protocol that allows traffic to be tunneled between a source and a destination Internet Protocol (IP) address. The malware continuously attempts to reach out to the source and the designation system, which allows either side to initiate a tunneling session. The malware can be configured with a proxy server/port and proxy username and password. This feature allows connectivity to a system sitting inside of a proxy server, which allows the actor to bypass the compromised system’s required authentication to reach outside of the network.
Category: Malware
Type: Tunneling
Information: https://www.us-cert.gov/ncas/analysis-reports/ar19-252b
Information: https://securelist.com/blog/sas/77908/lazarus-under-the-hood/
Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.electricfish
Malpedia: https://malpedia.caad.fkie.fraunhofer.de/details/win.alreay
Alienvault-otx: https://otx.alienvault.com/browse/pulses?q=tag:ElectricFish
Last-card-change: 2020-05-13
Source: https://apt.etda.or.th/cgi-bin/listtools.cgi
TA0043 | TA0042 | TA0001 | TA0002 | TA0003 | TA0004 | TA0005 | TA0006 | TA0007 | TA0008 | TA0009 | TA0011 | TA0010 | TA0040 |
---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Reconnaissance | Resource Development | Initial Access | Execution | Persistence | Privilege Escalation | Defense Evasion | Credential Access | Discovery | Lateral Movement | Collection | Command and Control | Exfiltration | Impact |